Arjun : HTTP Parameter Discovery Suite

6 years ago

Arjun is a web applications use parameters (or queries) to accept user input, take the following example into consideration. http://api.example.com/v1/userinfo?id=751634589…

HomePWN : Swiss Army Knife for Pentesting of IoT Devices

6 years ago

HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day…

Femida : Automated blind-XSS Search For Burp Suite

6 years ago

Femida is automated blind-xss search plugin for Burp Suite. Installation Git clone https://github.com/wish-i-was/femida.git Burp -> Extender -> Add -> find and select…

Slither : Static Analyzer for Solidity

6 years ago

Slither is a Solidity static analysis framework written in Python 3. It runs a suite of vulnerability detectors, prints visual…

AutoMacTC : Automated Mac Forensic Triage Collector

6 years ago

AutoMacTC is a modular forensic triage collection framework designed to access various forensic artifacts on macOS, parse them, and present…

Password Lense: Reveal Character Types In A Password

6 years ago

Certain characters in passwords ('O' and '0', 'I' and 'l', etc.) can be hard to identify when you need to…

Snare : Super Next Generation Advanced Reactive HonEypot

6 years ago

Snare is a super next generation advanced reactive honeypot.It is a web application honeypot sensor attracting all sort of maliciousness…

Osmedeus – Fully Automated Offensive Security Framework For Reconnaissance And Vulnerability Scanning

6 years ago

Osmedeus is a fully automated offensive security framework for reconnaissance and vulnerability scanning Osmedeus allows you automated run the collection…

Uac-A-Mola : Tool For Security Researchers To Investigate New UAC Bypasses

6 years ago

UAC-A-Mola is a tool that allows security researchers to investigate new UAC bypasses, in addition to detecting and exploiting known…

FOCA : Tool To Find Metadata & Hidden Information In The Documents

6 years ago

FOCA is a tool used mainly to find metadata and hidden information in the documents it scans. These documents may…